About your Search

20130416
20130424
Search Results 0 to 5 of about 6
. >>brian: joining us with more on this technology taken from above, anna kooiman. >> good morning. they are stunning, these images. they were taken while taking tsarnaev into custody. you can see in the video released by the massachusetts state police, the 19-year-old in the boat, that image you see there is his body highlighted to thermal imaging. police were able to monitor his every movement because of this technology. now watch this. those big black puffs, those are explosions believed to be the flash grenades police threw at him. the company that makes the thermal cameras said the equipment worked exactly how it was supposed to. >> i think it was a real win they could look through the cover and see him lying inside the technology has been around for decades, but as you can see it keeps getting better and better. flare has more than 100 cameras in law enforcement communities. that is all around the world, not just here in the u.s. >>gretchen: thanks for that update. so much more information coming out in the last 48 hours after the killing and then the capture of the suspects.
effective defense of attribute may not be all of its radars and sensors and missiles and stealth technology and ability to fly it synthesized speech. it might well be the way it was designed to avoid budget cutters in washington. >> now a hearing on the justice department's 2014 budget request. attorney general eric holder testified before how supra-patient subcommittee for a little more than two hours. be attorney general holder we welcome you to the committee and thank you for appearing. i'm going to hold my questions until the very end because members have to catch planes and go out of town but i will have an opening statement to cover questions and concerns that i have. let me address the bombing attack at the boston marathon on monday. we know the fbi and the joint terrorist task force batf and its forensic specialists in all the federal state and local authorities are working nonstop to determine who carried out this barbaric act. let me assure you the subcommittee is ready to help in any way we can to help law enforcement against perpetrators and planners of this act of terror and in
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
of their own people and continue to develop technology it is a matter of time before they have technology to reach us. do you agree with that? >> probably so. if they keep working at it and they have a single-minded focus focus, particularly the current leader may be more intensely than his father i think feels that is the key to their survival. >> i think that is a good honest assessment put them in the bucket of threats that the nation faces a capable of north korea with larger missiles and probably smaller bombs producing that is a reasonable threat we should plan against if nothing changes? >> i do blie that. >> syria. to give enough chemical weapons to kill thousands? >> potentially yes and that is very dependent on lots of things are the number of casualties that could be incurred in favor employee. >> but they have a lot that could killltofpele >> correct. that's another step. over the last six months as we are imposing sanctions and negotiating through the regime do they have more or less enriched uranium? >> we will get you the exact numbers enclosed context. >> can i say it is m
of this implementation was really to create information and technology exchanges in every part of the country. and they are focusing most specifically on critical access, hospitals and on small providers. knowing that the l to have a big i.t. department or have people who could implement this in a sfiio of time were not there. so in every state there are individuals who are sort of, i compared them to the farm extension services, folks were on the ground literally, office to office, hospital to hospital, spend time on how to convert what the best strategies are, how did engaged and involved. and we found at least in a state like kansas, which is not terribly different from the challenges i think that you see in your state, that that strategy has been enormously effective. and small providers are engaged and enrolled with those extensions operations, and find them to be kind of their service team on the ground. >> the only thing i would say, i hope that as we move forward with this, that the focus really will be on issue of interoperability we've asked questions numerous time of the committee
Search Results 0 to 5 of about 6